Co-Director:
Programme Leader:
Module Leader:
Research Interests: Cyber security, Machine learning, Visualisation - insider threat, security analytics, adversarial AI, explainable AI
Keep an online record of what you have studied - what did you do? why it was useful? what have you learnt? Develop a habit of blogging - short articles that summarise your learning.
W3 Schools offer a Cyber Security primer that you should begin reading. It covers four core topics: Cyber Security, Networking, Cyber Attacks and Cyber Defence. Aim to complete at least one section each week as part of your additional reading.
https://www.w3schools.com/cybersecurity/index.php
On completion of each section, you should aim to write a short summary article (max. 1000 words) to add to your online portfolio to demonstrate your learning.
We will be looking at the following tasks:
We will show a complete "boot-to-root" example of penetration testing. The purpose of the exercise is to get a feel for the process involved, and to introduce some initial tools that you need to be familiar with. You will want to study the process again at a slower pace in your own time, to fully understand how to gain full machine access.
On completion of the task, you should aim to write a short summary article (max. 1000 words) to add to your online portfolio to demonstrate your learning.
We will be looking at the following tasks:
We will explore a vulnerable web application to demonstrate common issues that can be exploited by attackers. We will use Burp Suite to examine requests and to further our understanding of networking and communications. You will want to study the Juice Shop further in your own time, and reflect on your reading from the W3 schools materials.
On completion of the task, you should aim to write a short summary article (max. 1000 words) to add to your online portfolio to demonstrate your learning.
We will be looking at the following tasks:
We will explore Splunk - a Security Information and Event Management (SIEM) tool for investigating cyber security data feeds. It is widely used by cyber security analysts and Security Operations teams. We will work through a scenario where we investigate the activities related to the cyber attack using Splunk.
On completion of the task, you should aim to write a short summary article (max. 1000 words) to add to your online portfolio to demonstrate your learning.
We will be looking at the following tasks:
We will explore Metasploit - a widely used tool for offensive security that can be used to deploy known attack vectors (CVEs) against target machines. It is a powerful tool suite so you should conduct research on the tool using the first room. The second room illustrates this tool in practice for gaining access to a vulnerable Windows machine. Previously we have accessed a Linux machine, and so this will give you some exposure to different Operating Systems. We also explore Bolt to see how a Content Management System (CMS) could be compromised.
On completion of the task, you should aim to write a short summary article (max. 1000 words) to add to your online portfolio to demonstrate your learning.
We will be looking at the following tasks:
We will take a brief look at malware analysis to introduce the topic area. We will consider the different ways that malware can be examined. We will run some practical examples of malware analysis using TryHackMe to ensure safe execution of any potentially dangerous files. We will explore how malware developers may attempt to hide their actions, and how we as defenders may attempt to recover this behaviour.
On completion of the task, you should aim to write a short summary article (max. 1000 words) to add to your online portfolio to demonstrate your learning.
We will be looking at the following tasks:
Cyber security practitioners should have an awareness of information risk management - it is fundamental to the role of protecting data, information, and computer systems. You should think about the threats, vulnerabilities and assets that contribute to give an overall risk, and how that can be assessed based on likelihood and severity. You should consider how to mitigate attacks that may impact on confidentiality, integrity and availability of information.
On completion of the task, you should aim to write a short summary article (max. 1000 words) to add to your online portfolio to demonstrate your learning.
Finally, you should reflect on your portfolio. You should now be near to completing your online portfolio, and should share this with your peers and teaching team for comment and feedback.